As the security key management problem is of great importance in Heterogeneous Wireless Sensor Networks (HWSN), in this paper, the authors concentrate on how to design an effective security key management scheme in HWSN based on the clustering strategy. HWSN is belonged a special kind of wireless sensor networks, which
...

The merit of certificate-based encryption lies in implicit certificate and no private key escrow. This feature is desirable especially for the efficiency and the real spontaneity of ring signature, which involve a large number of public keys in each execution. In this paper, the authors propose an efficient certificate-based ring
...

As cloud storage can achieve the goal that getting all storage resources in a plug-and-play way, it becomes a focus of attention. It has the advantages of high scalability, ease-of-use, cost-effectiveness and simplifying infrastructure planning etc. However, because of security and reliability, cloud storage is not widely adopted. When users
...

Recently, Hsiang and Shih proposed a secure dynamic ID based remote user authentication scheme for multi-server environment. In this paper, the authors show that Hsiang and Shih's scheme is still vulnerable to off-line password guessing attacks, impersonation attacks and server spoofing attacks. And it cannot resist against extracting secret data
...